ArbiterXero, 1 year ago Yes, but these are requests for new devices to pair And most people aren’t going to bother with that white list And even if they did, the attack can be tailored to the white list, because you don’t need to have a real Mac address, it can be spoofed
Yes, but these are requests for new devices to pair
And most people aren’t going to bother with that white list
And even if they did, the attack can be tailored to the white list, because you don’t need to have a real Mac address, it can be spoofed